Supervised machine learning using encrypted training data Francisco-Javier González-SerranoAdrián Amor-MartínJorge Casamayón-Antón Regular Contribution 19 June 2017 Pages: 365 - 377
Improved yoking proof protocols for preserving anonymity HyoungMin HamJongHyup LeeJooSeok Song Regular Contribution 22 June 2017 Pages: 379 - 393
When time meets test Jean-Louis LanetHélène Le BouderAxel Legay Regular Contribution 10 April 2017 Pages: 395 - 409
ZombieCoin 2.0: managing next-generation botnets using Bitcoin Syed Taha AliPatrick McCorryFeng Hao Regular Contribution 01 June 2017 Pages: 411 - 422
A new strong security model for stateful authenticated group key exchange Zheng YangChao LiuSong Luo Regular Contribution 17 April 2017 Pages: 423 - 440
A pairing-based cryptographic approach for data security in the cloud Miguel Morales-SandovalJose Luis Gonzalez-CompeanVictor J. Sosa-Sosa Regular Contribution 28 April 2017 Pages: 441 - 461
Flexible ciphertext-policy attribute-based encryption supporting AND-gate and threshold with short ciphertexts Yinhao JiangWilly SusiloFuchun Guo Regular Contribution 17 May 2017 Pages: 463 - 475
Efficient revocable hierarchical identity-based encryption using cryptographic accumulators Hongyong JiaYue ChenJun Wang Regular Contribution 31 July 2017 Pages: 477 - 490